Unit-5 Notes
Unit-5 Notes
• In the interactive applications one page may get linked with other pages
dynamically. Especially in case of interactive web application this linking of
the pages is through hyperlinks. This linking is based on user input.
• Files can be easily shared, accessed, edited and saved. The interactive
applications boosts the communication. The information can be shared using
email, print and files.
• The documents can be annotated and effective changes can be made while
handling the interactive application. The tools such as 3D modeling,
hyperlinks, video links and other applications can be embedded within an
interactive application.
• The data dictionary is dynamic; any changes in the data item are effective
immediately for all applications that include the data item. Applications
access the data dictionary at runtime and immediately reflect modifications to
data item.
2. Understanding the Table Design:
• A relational database table stores the data that an application uses in columns
and rows. Each column is a data item, and each row is a record. One or more
tables can be used in an application.
• To create a table, the required data items are selected. These data items must
already exist in the data dictionary. Then assign the key fields as indices for
retrieving and updating the data belonging to the tables. Various operations
that can be performed on this database table‟s are- create, insert record and
delete particular record, and update some record.
Advantages of DBMS
1. Reduced Data redundancy – The database approach removes the
redundancy by integrating the files. This approach cannot eliminate redundancy
completely but can control the data redundancy.
2. Data consistency - In this approach all copies of data are kept consistent.
3. Sharing of data - The centralized stored database can be accessed by
multiple users or application programs.
4. Centralized database- Data is stored in a single repository and an authorized
access to this data is allowed. Only the administrator can give appropriate access
rights to the authentic users.
5. Data Integrity – This provides validity and consistency of stored data.
6. Improved Security – The database approach prevents unauthorized access to
data by means of user name, password, and access rights.
7. Use of Standards - Certain standards can be enforced to database approach
for data formats, naming conventions, documentation standards, access rules and
so on.
8. Backup and Recovery - The Backup and Recovery – The backup and
recovery actions can be taken in its current consistent state from inconsistent
state
9. Increased productivity - The database approach allows programmer to
concentrate on specific functionality required by the user.
10. Increased Concurrency- The database approach handles the concurrent
data effectively. The loss of information or integrity is avoided in this approach.
11. Improved Maintenance
Disadvantages of DBMS:
Complexity – Difficult to implement
Size - Large storage space
Cost - The multiuser database management system is very expensive.
Data Models
They describe the logical structure of a database, relationship between the
database stored in database and various constraints on data.
Importance of Data Model
1. End users have different view for data.
2. Data model organizes data for different users.
Advantages:
This model groups the data into tables and defines the relationship between the
tables.
Disadvantages
• For searching any data, we have to start from the root and move downwards
and visit each child node. Thus traversing through each node is required.
• For addition of some information about child node, sometimes the parent
information needs to be modified.
• It fails to handle many to many relationships. It causes duplication and data
redundancy.
2. Network Model:
This is enhanced version of hierarchical model. It addresses the M:N relationship .
i.e No single parent concept. So, any child in this model can have any number of
parents.
Advantages:
1.Capability to handle more relationships: Since the network model allows many
to many relationship, it helps in modeling real life situations.
2.Ease of data access
3.Data Integrity
Disadvantages:
1.Complex to implement, Complicated Operations, Difficult to change structure.
3. Relational Model:
In a relational model, the data is stored in the form of tables. The database
systems based on it are called relational database systems. These tables are
related to each other.
Advantages:
1. The database design is simple to implement and manage.
2. In this model, the table is an entity which is primarily used. Hence insertion,
deletion and retrieval of data become easy.
3. The data can be easily linked with other table, using the table attributes.
4. It facilitates the support for SQL languages.
5. It ensures the structural independence.
Disadvantages:
1. It has substantial hardware and software overhead.
2. It can facilitate to poor design and implementation.
3. It cannot handle the data in the form of images, audio or video.
4. E-R Model:
This model is basically used to design the relational database systems; the
primary purpose of E-R Model is to show the relationship between various data
objects. The object relationship pair can be graphically represented by a diagram
called Entity Relationship Diagram (ERD).
Components of ERD:
Entity: An entity is an object that exists and is distinguishable. It is similar to a
record in a programming language with attributes and entities are represented by
rectangle.
Relationship: An association among several entities. It is represented in
diamond. Relationship may have attributes and have cardinality (e.g. One-to-
many).
Attribute: It is drawn in ellipses. It is similar to record fields in a programming
language. Each attribute has a set of permitted values called domain.
Notations used in ER Diagram:
• Entity: It is an object and distinguishable it is similar to record.
• Weak Entity: When this entity is dependent upon some another entity then it
is called weak entity.
Advantages:
1. Simple to design.
2. Visual Representation.
3. Easy Conversion to tables.
Disadvantages:
1. Limited Specification.
2. High level design.
3. No industry standard.
Architecture of Database Systems:
The database system architecture represents the structure and layout of the data
stored in it. The architecture of database system can be from single tier to
multitier. The multi-tiered system divides the whole system into multiple
modules. Each of these individual modules can be independently altered or
modified.
Database Tier:
• This is the layer at which the actual database resides. In this layer, all the
tables, their mappings and the actual data present. When you save your
details from the front end, it will be inserted into the respective tables in the
database layer, by using the programs in the application layer.
• When the user wants to retrieve the data from this database, the database
layer fires the queries to get the data from the tables present in the database.
Application Tier:
• This layer sends the requests made by the users of presentation tier to the
database tier and returns the response from database tier to presentation tier.
The layer has all the business logics like validation, calculations and
manipulations of data.
• If this layer sees that the request is invalid, it sends back the message to
presentation layer. Hence, the application layer sits in the middle and acts as
the mediator between the users and the database.
Presentation Tier:
• This layer is made up of the users who use the database. These users have no
knowledge of underlying database. At this layer multiple views of the
database are provided.
Data Independence:
Definition: Data independence is an ability by which one can change the data at
one level without affecting the data at another level. Here level can be physical,
conceptual or external.
Data independence is one of the most important characteristics of database
management system. By this property, the structure of the database can be easily
modified by without changing the application programs. There are two types of
independence:
1. Physical Independence:
This is the kind of data independence which allows the modification of physical
schema without requiring any change to the conceptual schema. For example – if
there is any change in memory size of database server then it will not affect the
logical structure of any data object.
2. Logical Independence:
• This kind of data independence allows the modification of conceptual
schema without requiring any change to the external schema. For example –
Any change in the table structure such as addition or deletion of some
columns does not affect user views.
• By these data independence the time and cost acquired by changes in any
level can be reduced and abstract view of data can be provided to the user.
Data Dictionary:
• Data dictionary contains information about database itself. The data
dictionary thus contains the metadata i.e. data about data. Following types of
information is stored in data dictionary:
Definition of database objects such as tables, views, constraints, clusters,
procedures, functions, triggers
Column name
Data type information
Amount of space required to store the data object
Default field values
Access rights
Database usernames – Schema information
Last updated or accessed information
• All this information can be stored in tables , XML files or in spreadsheet. The
data dictionary is updated automatically by the database systems when user
issues the corresponding queries.
Keys used in Database Applications
Keys are important in relational database in order to establish the relationship
between the tables. The keys are also used to access the records in the database
table. Following are the various keys that are used in database system.
1. Primary Key:
This is the most important key in database which uniquely identifies the record.
It can be a single attribute or combination of attributes. The database designer
has to specially assign one of the candidate keys as primary key so that the
record can be uniquely identified with the help of it.
For example – Stud_RollNo is a primary key from the student database.
2. Candidate Key:
A candidate key is a single field or the least combination of fields that uniquely
identifies each record in the table. But the individual attribute cannot identify the
record uniquely.
For example – FirstName, LastName, Address in combination can uniquely
identify the record, but individually FirstName, LastName or Address cannot
uniquely identify the record.
4. Composite Key:
The key that consists of two or more attributes that uniquely identifies an entity
occurrence is called Composite key. For example to identify the Student taking
particular course we can uniquely identify such type of record by combining two
or more columns from the same table. Hence, Stud_RollNo and CourseId
together form a composite key.
4. Foreign Key:
A Foreign Key is generally a primary key for one table that appears as a field in
another where the first table has relationship to the second. For example:
consider the following student table in which CourseID is a foreign key.
MULTIMEDIA APPLICATIONS
• The word multimedia means more than one media for conveying
information. The multimedia can be defined as:
• Computer- based techniques of text, images, audio, video, graphics,
animation, and any other medium where every type of information can be
represented, processed, stored, transmitted, produced and presented digitally.
Examples:
• Some of the important programs are listed below in some categories. They
are:
Maya, Flash, Blender, comes mainly under graphics category.
Interactivity category basically includes MySQL, AJAX, Flash and Flex
and PHP.
Audio category is of sound slides, Pro-tools, Adobe Auditions and
more.
Similarly programs in video category are Canopus Edius, i Movie,
Flash Video Encoder, Final Cut Pro.
Text programs are like Word press, InDesign, and Dream Weaver.
Components of Multimedia:
1. Text can be added for giving emphasis.
2. Graphics are added for visual impact. A picture is worth a thousand words.
Graphics enhance presentation.
3. Voice or audio enhance presentation by adding persuasion.
4. The animation is for attracting attention. A chart can be focused more
quickly by adding animation to it.
5. Video is multimedia can be used for providing clear instructions.
Uses of Multimedia:
1. Education
• Multimedia is extensively used in the fields of education and training. Even
in conventional method audio visual techniques for imparting education like
charts, model etc. were used. Now a days the classroom need is not limited to
that conventional method rather it needs audio and visual media.
3. Business
• The business application of multimedia includes, product demos, instant
messaging. One of the excellent applications is voice and live conferencing.
Examples
1. Supply Chain Management: This system is for managing the flow of goods
and services that involves the movement and storage of raw materials, work-
in-progress inventory and finished goods.
2. Customer Relationship Management: Manages communication and
marketing initiatives directed at customers.
3. Geographic Positioning System (GPS): it provides driving directions and
desired locations.
4. Enterprise Resource Planning (ERP): It is an information system used to
integrate the management of all internal and external information across an
entire organization.
• The parts of information system are: Input, Processing, Output and Feedback
1. Input:
• Input is an activity of gathering and capturing raw data. For example- in
online student information system, instructor has to submit the detailed
information of students so that the summary of students information can be
compiled.
2. Processing:
• Processing means converting or transforming data into useful output.
• Processing can involve calculations, comparing data and taking alternative
actions, and storing data for future use. For example – in tax management
system – the tax needs to be calculated using the data such as gross salary,
insurances, other deductions and so on.
• Processing data into useful information is critical in business settings.
Processing can be done manually or with computer assistance. After
processing the data results are typically stored in storage.
3. Output:
• Output involves producing useful information in the form of documents or
reports.
4. Feedback:
• In information system, feedback is information from the system which is
used to make changes to input or processing activities.
2. Requirement Analysis:
• This is very important part in the development of an Information System and
involves looking at an organization or system and finding out how
information is being handled at the moment.
• The stage where users and IT specialists work together to collect and
comprehend the business requirements. Based on requirements, both will
work on the design and discuss the tasks to be done.
5. Implementation:
• The stage where system is in place and is used by the actual workforce. User
guide manual and training are provided to users.
6. Evaluation
• During this stage system is evaluated for any bug from time to time.
7. Maintenance
• This is the stage where system needs to be enhanced or strengthened in order
to meet the goals of the organization.
• There are various roles in the personal information system such as-
employee, manager, customer, and student and so on.
• Conceptually PIS is of collection information and methods that help the people to
maintain the information of persons.
• This information system can be maintained offline. One can carry this information
system even in pen drive.
• Example - Address book system, Personal Notes, Email notification, Reminders
and Alert system, Lists, Personal File collection system(document, music, photos),
Instant messaging systems
Exercise: Design a simple personal application that gives you reminders for
each day. Identify the inputs to be taken, processing to be done, and the
output to be produced . What multimedia components can be added to this
application?
• The personal application for reminder is a simple and effective application
that can be used in a busy schedule for reminding the day to day activities.
Features of this application:
• Users can set / update date / time of particular event.
• The history data can be cleared.
• Priority of task can be set or changed.
• One can feed to-do list to the application.
• The meeting schedule can be input to the application. The remaining
application will display the schedule one hour prior to actual schedule.
• The birthdays, anniversaries or important dates can be reminded on particular
dates by flashing images, messages and ringing alarm. Users can stop the
alarm or press „remind me‟ after sometime button.
• Email data via, name of person, email address, and phone number and so on
can be used by the application as input. This feature can be set if user permits
to do so.
• The day / date / time can be set according to appropriate time zone of the
country.
The sample GUI for per simple personal application that gives you reminders is
as follows:
• Input: Name of the person, birthdate, anniversary date, meeting time, purpose
of meeting, allotted timing for meeting.
• Processing: It involves making calculations, matching data against system
date, matching person name, storing data for future use.
• Output: Displaying reminder information on the device, displaying date,
ringing alarm, flashing light.
Multimedia Components:
• Text: The text is used for typing the input to the system as well for displaying
the name of the event, detailed information about some schedules, to-do list,
and name of the person and so on.
• Graphics: The attractive graphics flashing as output, matching with date or
time of particular event.
• Image: The image / photo of the persons can be displayed on the app while
reminding the birthdays and anniversaries.
• Audio: Melodious songs or ringtone will be ringing for the reminder alarm.
• Animation: Animated images or text can be displayed on the device for
reminding app on particular event.
INFORMATION RETRIEVAL SYSTEM (IRS)
• Information retrieval is the activity of obtaining information resources relevant to
an information that is needed from a collection of information resources.
• The information retrieval process begins when user submits the query to the
system. Queries are formal statements of information need. The user queries are
matched against the database information.
• Most of the information retrieval systems compute the numeric score on how well
each object in the database matches the query and rank the objects according to its
value.
• The top ranking objects are presented to the user.
• This process can be iterated if the user wishes to refine the query.
3. Scalability: This is the issue that deals with working with millions of users
every day, and with many terabytes of documents.
Step 3: The web pages are then sent to Indexing module. This module extracts
the key element contents such as title tag, image tag, description tag, and internal
links and so on. The set of indices are prepared from the extracted contents present
on the web pages.
Step 4: User Interface module displays the search engine web address (say
Google) using which the user can type the query.
Step 5: This query is then submitted to Query module, which breaks down the
query and transforms it in a language which the search engine can understand.
This query module then collects the results from indexes and passes these results
to Ranking module.
Step 6: The task of ranking module is to filter the contents and put them back
on the user interface according to their ranking. Based on the popularity of the
modules the rank of the web pages is decided.
Step 7: Then the user gets the result displayed on the user interface. If user
want to get the result of particular type of information (images), then the query
module need to be changed. And then the ranking module need to be changed so
that it can display only the images and not the text contents.
Examples of Popular Search Engines
SOCIAL NETWORKING APPLICATIONS
• Social networking applications are online technologies that allow users to
communicate with each other.
• Most popular social networking applications are developed with a purpose of
looking for people with common interests to give them an opportunity to
discuss various topics, videos and photos, add each other to the friends
category, upload music etc..
• One of the largest advantages of social networking application is the
opportunity to find your old friends and relatives. Apart from that, social
media has a great potential to create virtual jobs.
• They make it possible to provide the client with timely service. The most
popular messengers today are Whatsapp, Facebook Messenger and so on.
2. Live Streaming Applications
• Live streaming apps are gaining wide popularity day by day. Live stream
video is interesting for consumers because it‟s a more of an authentic
advertising type, rather than an already edited video clip.
• For example, the company can show how they manufacture their goods, hold
various contests, raffle some gifts and so on. Different social media apps like
Periscope, Meerkat dominate the social media apps sector.
4. Lifestyle Application
• Fashion, movies, hobbies, sports, leisure, travel, daily routine – all these
activities make life versatile and interesting. Lifestyle apps conquer the
mobile apps market since they simplify some of our daily routines. Operator,
Foursquare Swarm, Nextdoor – are the few of the most popular applications.
5. Social Blogging Applications
• Persons having great writing skills make blogs to publish their thoughts on
social media publicly or within some group. Blogger, Tumblr are some
services that offer the blogging facility. The service allows users to post
multimedia and other content to a short- form blog.
5. Interactivity
The objective of social networking sites is to facilitate interactions between
users by actively involving users. User can share photos, videos, locations,
comments among the friends using the social networking applications.
Notifications
Typically positive notifications are sent on social networking application. For example
Mr. X and Mr. Y are now friends – such notification in common on Facebook but there
is no notification that such and such person is removed from the friend-list. It enhances
the positive atmosphere on social networking sites.
Unauthorized Access
There is a tendency to make unauthorized access to user‟s profile using social
networking site.
Child Safety
The major issue of concern is teenagers and children make misuse of social networking
services. For instance, there is a study which suggests that children are not too far from
inappropriate content on YouTube. Overuse of social networking sites also brings the
depression and anxiety among the teenagers.
Trolling
Social networking sites such as Facebook are occasionally used to emotionally
abuse, harass or bully individuals, either by posting defamatory statements or by
forwarding private digital photos or videos that can have an adverse impact on the
individuals depicted in the videos. Such actions are often referred to as “trolling”.
Online Bullying
Online bullying also called cyber bullying, is a common occurrence due to social
networking sites and result in emotional disturbance.
Data Mining
Data mining companies can improve sales and profitability using the social
networking applications.
Awareness of Rights
Workers or employees get aware of their rights due to use of social networking
applications.
Social Anxiety
Due to increasing number of messages and use of social networking applications
people get connected continuously. One cannot get his/her own space. Sometimes it
may create a negative impact on friends, relatives and thereby the social anxiety gets
increased.
Growth of Patents
There has been rapid growth in the number of patent applications that cover new
technologies related to social networking. The number of published applications has
been growing rapidly since 2003.